Sciweavers

1047 search results - page 116 / 210
» Using Objects for Next Generation Communication Services
Sort
View
INFOCOM
1999
IEEE
15 years 7 months ago
Key Management for Secure Internet Multicast Using Boolean Function Minimization Techniques
Abstract-The Internet today provides no support for privacy or authentication of multicast packets. However,an increasing number of applications will require secure multicast servi...
Isabella Chang, Robert Engel, Dilip D. Kandlur, Di...
PERCOM
2003
ACM
16 years 2 months ago
Location-Detection Strategies in Pervasive Computing Environments
Pervasive computing environments accommodate interconnected and communicating mobile devices. Mobility is a vital aspect of everyday life and technology must offer support for mov...
Sebastian Fischmeister, Guido Menkhaus, Alexander ...
ICRA
2007
IEEE
159views Robotics» more  ICRA 2007»
15 years 9 months ago
Combined Trajectory Planning and Gaze Direction Control for Robotic Exploration
— In this paper, a control scheme that combines trajectory planning and gaze direction control for robotic exploration is presented. The objective is to calculate the gaze direct...
Georgios Lidoris, Kolja Kühnlenz, Dirk Wollhe...
WMCSA
2002
IEEE
15 years 8 months ago
Composing Pervasive Data Using iQL
The emergence of pervasive networked data sources, such as web services, sensors, and mobile devices, enables context-sensitive, mobile applications. We have developed a programmi...
Norman H. Cohen, Hui Lei, Paul Castro, John S. Dav...
WICOMM
2008
258views more  WICOMM 2008»
15 years 2 months ago
Introducing reliability and load balancing in mobile IPv6-based networks
With the recent advances in portable devices and wireless networks, a new paradigm of computing has emerged which is known as mobile computing. In general mobile computing can be ...
Jahanzeb Faizan, Hesham El-Rewini, Mohamed Khalil